Marc is a technology journalist with over 15 years experience. He specializes in content related to emerging technologies, cybersecurity, big data, privacy, artificial intelligence, and the politics of technology.
He has worked for some of the largest tech companies (Deluxe Digital, Sony, Autodesk) and is passionate about online privacy and digital freedom.
If your infrastructure is vulnerable to server-side request forgery attacks, the consequences could be devastating to your organization. We explain how SSRF attacks work and how you can avoid them.
You may not have heard of typosquatting before but it can have some pretty serious consequences. This post looks at how typosquatting works and what you can do to defend against it.
Form action Hijacking attacks can compromise your personal information online. In this post, we look at how that attack works and what you can do to prevent them.
Masquerade attacks can be difficult to detect because the attackers use valid credentials. This post takes looks at how masquerade attacks work and provides tips on how to defend against them.
Software vulnerabilities are quite common but if even one of them turns out to be a zero-day, the damage could be massive. We look at what zero-day exploits are and what you can do about them.
Shadow IT is a unique vulnerability insofar as it's largely unintentional. In this article we look at what shadow IT is, what its risks are and how to mitigiate them.
Path traversal attacks may not get as much attention as other online attacks but they can be quite nasty. In this post, we look at how path traversal attacks work and how to prevent them.
Why would you want to keep your VPN enabled all the time? There are actually some compelling reasons to do this. We look at the pros and cons of an always-on VPN.